This live demonstration shows two simple realistic scenarios. In the first a user browses and then attacks an application. In the second, a privileged user manipulates a database. IBM Security detects and secures these activities. The information is correlated; yielding Security Intelligence. The demonstration can be found HERE.